CSA Talk May 2018: Difference between revisions
From Federal Burro of Information
Jump to navigationJump to search
(Created page with " == A Grab Bag of Security Practices == * root mfa * using roles to access account from a cetnral place. * using peering to central manage * using config rules * IAM policy b...") |
No edit summary |
||
Line 1: | Line 1: | ||
Sca | |||
== A Grab Bag of Security Practices == | == A Grab Bag of Security Practices == |
Revision as of 17:46, 17 April 2018
Sca
A Grab Bag of Security Practices
- root mfa
- using roles to access account from a cetnral place.
- using peering to central manage
- using config rules
- IAM policy best practices.
- Auditing and forensics.
- the cloudtrail -> s3 -> cloudwatch trinity
- s3 replication
- s3 imutablity
- Anomaly detection datadog
- anti patterns
- egress backhaul.
- Partners and Vendor: what can my vendor do?